powershell-module-architect
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The TypeScript wrapper
module_architect_wrapper.tsexecutes PowerShell scripts usingspawnwith the-ExecutionPolicy RemoteSignedflag. This explicitly bypasses local security restrictions designed to prevent the execution of unsigned scripts. - [COMMAND_EXECUTION] (LOW): The
executePowerShellfunction in the TS wrapper constructs command arguments from user-controlled object keys and values. While usingspawnmitigates shell injection, the lack of a strict allowlist for parameter names allows for parameter injection (e.g., passing unexpected flags to the PowerShell executable). - [DYNAMIC_EXECUTION] (MEDIUM): The
REFERENCE.mdfile includes a pattern for 'Assembly Caching' that utilizesAdd-Typeto compile C# source code into a DLL at runtime. This allows for the execution of arbitrary compiled code if the source directory is compromised. - [EXTERNAL_DOWNLOADS] (LOW): Documentation in
best_practices.mdrecommends the use ofInstall-ModuleforPSScriptAnalyzer. This facilitates the download and execution of code from the PowerShell Gallery, an external repository where packages are not implicitly trusted. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a significant attack surface for indirect injection.
- Ingestion points:
analyzeModuleandgetDirectoryStructureread file and directory names from the local file system. - Boundary markers: None identified in the provided templates.
- Capability inventory: The skill can execute PowerShell scripts, compile code, and write files to the disk (
createDocumentation). - Sanitization: Input parameters are converted to strings but are not validated against a rigid schema or sanitized before being passed to the PowerShell execution environment.
Audit Metadata